Lines Matching +full:down +full:- +full:scaling
3 .\" Copyright (c) 2010-2011 The FreeBSD Foundation
50 protocol provides reliable, flow-controlled, two-way
52 It is a byte-stream protocol used to
58 Internet address format and, in addition, provides a per-host
119 .Bl -tag -width ".Dv TCP_FUNCTION_BLK"
122 by passing the read-only option
136 bandwidth-controlled window space.
161 For passively-created sockets, the
167 but that fall back to using a non-TFO
174 pre-shared key (PSK) mode of operation in which the TFO server requires the
184 requires the client-supplied cookie to equal
185 .Bd -literal -offset left
186 SipHash24(key=\fI16-byte-psk\fP, msg=\fIcookie-sent-to-client\fP)
189 Multiple concurrent valid pre-shared keys are supported so that time-based
191 The default number of concurrent pre-shared keys is 2.
204 section further down.
213 option accepts a per-socket timeout argument of
215 in seconds, for new, non-established
222 section further down.
238 section further down.
244 to set the per-socket interval, in seconds, between keepalive probes sent
253 section further down.
259 and allows a per-socket tuning of the number of probes sent, with no response,
268 section further down.
284 By default, a sender- and
285 .No receiver- Ns Tn TCP
297 to set the per-socket interval, in seconds, in which the connection must
313 option use on a per-connection basis.
316 .No sender- Ns Tn TCP
324 When this option is set to a non-zero value,
329 This option enables the use of MD5 digests (also known as TCP-MD5)
343 administrator to add a tcp-md5 key entry to the system's security
347 This entry can only be specified on a per-host basis at this time.
351 However, during connection negotiation, a non-signed segment will be accepted if
353 When a non-signed segment is accepted, the established connection is not
362 Enable in-kernel Transport Layer Security (TLS) for data written to this
374 Enable in-kernel TLS for data read from this socket.
384 .Bl -tag -width "Dv TCP_REUSPORT_LB_NUMA"
415 Incoming connection requests that are source-routed are noted,
434 .Bl -tag -width ".Va v6pmtud_blackhole_mss"
495 .Bl -tag -compact
529 When non-zero, all client-supplied TFO cookies will be considered to be valid.
534 are non-zero, a new key will be automatically generated after this specified
547 Read-only.
556 Read-only.
566 Read-only.
569 Read-only,
571 The maximum number of pre-shared keys supported.
572 Read-only.
575 Read-only.
577 The current number of pre-shared keys installed.
578 Read-only.
583 will be forced to be non-TFO for this many seconds.
591 When non-zero, pre-shared key (PSK) mode is enabled for all TFO servers.
592 On the transition from enabled to disabled, all installed pre-shared keys are
597 On the transition from enabled to disabled, all installed keys and pre-shared
601 is non-zero and there are no keys installed, a new key will be generated
611 Install a new pre-shared key by writing
648 .Bl -tag -compact
672 Any non-zero setting will be reset to zero, once the purge
674 .Bl -tag -compact
689 .Tn SYN-SENT
699 Start with small values for lower-capacity links.
728 Timeout, in milliseconds, for new, non-established
762 That prevents self-inflicted packet losses once the application starts to
773 (read-only).
781 A CSV list of template_spec=percent key-value pairs which controls the per
805 .Bl -tag -compact
824 the system-calculated automatic limit and the user-specified
852 (smoothed round-trip time)
864 For this reason, we use 200ms of slop and a near-0
869 Implement the window scaling and timestamp options of RFC 1323/RFC 7323
872 .Bl -tag -compact
874 Disable window scaling and timestamp option.
876 Enable window scaling and timestamp option.
878 Enable only window scaling.
887 Enable support for RFC 3390, which allows for a variable-sized
891 particularly affects short transfers and high-bandwidth large
892 propagation-delay connections.
907 Enable Lost Retransmission Detection for SACK-enabled sessions, enabled by
910 mandatory Retransmission Timeout (RTO), followed by slow-start.
911 LRD will try to resend the repeatedly lost packet, preventing the time-consuming
912 RTO and performance reducing slow-start or purge of the SACK scoreboard.
926 SACKed - even if no traditional duplicate ACKs were observed.
949 .Tn SYN-ACK
963 control-block hash table
964 (read-only).
1009 .Bl -tag -width Er
1091 .%T "Improving TCP's Robustness to Blind In-Window Attacks"
1099 The RFC 1323 extensions for window scaling and timestamps were added